US7899867B1 - SpIM blocking and user approval techniques for real-time messaging networks - Google Patents
SpIM blocking and user approval techniques for real-time messaging networks Download PDFInfo
- Publication number
- US7899867B1 US7899867B1 US11/031,123 US3112305A US7899867B1 US 7899867 B1 US7899867 B1 US 7899867B1 US 3112305 A US3112305 A US 3112305A US 7899867 B1 US7899867 B1 US 7899867B1
- Authority
- US
- United States
- Prior art keywords
- network
- challenge
- response
- ims
- client
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
- 238000000034 method Methods 0.000 title claims abstract description 52
- 230000000903 blocking effect Effects 0.000 title claims description 14
- 230000004044 response Effects 0.000 claims abstract description 143
- 238000012545 processing Methods 0.000 claims abstract description 20
- 238000004891 communication Methods 0.000 claims description 152
- 230000009471 action Effects 0.000 claims description 55
- 238000001914 filtration Methods 0.000 claims description 25
- 230000010365 information processing Effects 0.000 claims description 3
- 230000008569 process Effects 0.000 abstract description 12
- 230000008520 organization Effects 0.000 description 11
- 230000003993 interaction Effects 0.000 description 5
- 230000008859 change Effects 0.000 description 4
- 238000012552 review Methods 0.000 description 3
- 241000700605 Viruses Species 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 238000013507 mapping Methods 0.000 description 2
- 235000006508 Nelumbo nucifera Nutrition 0.000 description 1
- 240000002853 Nelumbo nucifera Species 0.000 description 1
- 235000006510 Nelumbo pentapetala Nutrition 0.000 description 1
- 230000002730 additional effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 230000003111 delayed effect Effects 0.000 description 1
- 230000000644 propagated effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/06—Message adaptation to terminal or network requirements
- H04L51/066—Format adaptation, e.g. format conversion or compression
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/212—Monitoring or handling of messages using filtering or selective blocking
Definitions
- the present invention generally relates to telecommunications and more specifically to a system and method for managing instant message communications.
- Spam on IM networks is the unauthorized sending of messages to an instant message screen name.
- an IM window is created on a user's screen as a pop-up window.
- the pop-up window typically includes the message from the spammer, such as any objectionable content, an advertisement, etc.
- the pop-up window cannot be avoided as it takes up visible (and valuable) screen real estate.
- a user typically has to respond to the pop-up window by minimizing it, closing it, or responding to the spammer.
- email which allows a user to deal with the spam at another time, the user is interrupted when IM spam is received.
- a popular new shorthand for IM spam is “spIM” (or “spim”, or SpIM, etc.).
- IM clients allow a user to block anyone not on their “buddy list” from contacting them.
- a buddy list may be any list of contacts. This effectively eliminates spam in that people not on the user's buddy list cannot contact the user. Blocking all users not on their buddy list, however, imposes a big limitation on an IM user. For example, friends of the user cannot contact the user without first being on the user's buddy list. Additionally, acquaintances or people that user may want to receive an IM from cannot IM with the user until the user puts them on his or her buddy list.
- a method of processing instant messages (IM) received from entities destined for IM clients is provided.
- An IM module is used to receive the instant messages and process them.
- the IM module may be used to determine if a message is spam or not.
- the IM module receives an instant message for the IM client and determines if a challenge message should be sent to the sender of the IM.
- the challenge IM is an IM that is sent to the sender of the IM that necessitates (or prompts, or warrants, etc.) a challenge.
- a challenge may be a question or any other statement that requires a response to a challenge.
- a response to the IM challenge is received at the IM module, it is determined if the response satisfies an answer required by the challenge IM. If the response satisfies the answer, the IM received may be forwarded to the IM client. If the response does not satisfy the answer, it may be classified as spam and not forwarded to the IM client. Also, if no response is received, the IM may be considered spam and the IM not be forwarded to the user. Thus, by declining a response to a challenge IM, the incoming IM may be classified as spam.
- a method for processing instant messages (IMs) from entities destined for IM clients using an IM module comprises: receiving an IM destined for an IM client at the IM module; determining if a challenge IM should be sent to a sender of the IM; if a challenge IM should be sent, sending a challenge IM to sender of the IM, the challenge message requiring a response from the sender; and if an IM response to the challenge IM is received at the IM module, determining if the response satisfies an answer required by the challenge IM; and forwarding the received IM to the IM client if the response satisfies the response required by the challenge IM.
- IMs instant messages
- a method for managing IMs from entities for one or more IM clients using an IM module comprises: determining a contact list for the one or more IM clients, the contact list including a list of identifiers; receiving an IM destined for an IM client in the one or more IM clients at the IM module; determining an identifier for the received IM; determining a contact list for the IM client, the contact list including one or more identifiers that may be associated with IMs; determining whether the determined identifier matches an identifier in the one or more identifiers; if the determined identifier does not match an identifier in the one or more identifiers, sending a challenge IM to an entity that sent the IM, the challenge message requiring a response from the entity; and if the determined identifier does match an identifier in the one or more identifiers, forwarding the received IM to the IM client.
- a method for processing instant messages (IMs) from entities destined for IM clients using an IM module comprises: receiving an IM destined for an IM client at the IM module; determining if a challenge IM should be sent to a sender of the IM; if a challenge IM should be sent, sending a challenge IM to sender of the IM, the challenge message requiring a response from the sender; and if an IM response to the challenge IM is received at the IM module, determining if the response satisfies an answer required by the challenge IM; and forwarding the received IM to the IM client if the response satisfies the response required by the challenge IM.
- IMs instant messages
- FIG. 1 depicts a system for processing instant messages according to one embodiment of the present invention
- FIG. 2 illustrates an embodiment of an instant message module
- FIG. 3 illustrates an embodiment of an instant message system
- FIG. 4 depicts a simplified flow chart of a method for managing instant message communications according to one embodiment of the present invention.
- FIG. 5 depicts a simplified flowchart for processing IM messages according to one embodiment of the present invention
- FIG. 6 depicts a system for processing IM messages according to one embodiment of the present invention
- FIG. 7 depicts an embodiment of IM module according to embodiments of the present invention.
- FIG. 8 depicts a simplified flowchart of a method for processing responses to challenge IMs according to one embodiment of the present invention.
- FIG. 1 illustrates an instant message system 100 for processing instant messages according to one embodiment of the present invention.
- system 100 includes a plurality of instant message (IM) clients 102 , a network 104 , an instant message module 106 , a firewall 108 , a network 110 , and a plurality of instant message clients 112 according to one embodiment.
- IM instant message
- IM clients 102 are used to send and receive instant message communications with other IM clients.
- IM clients may be installed on any computing device, such as a personal computer (PC), pocket PC, personal digital assistant (PDA), RIM blackberry device, telephone, cellular phone, pager, etc.
- PC personal computer
- PDA personal digital assistant
- RIM blackberry device telephone, cellular phone, pager, etc.
- IM clients 102 may send IM communications that include textual messages. Also, IM communications may be sent that signal configuration and/or control information, or indicate actions to be taken by an IM client 102 .
- IM communications include on-line and off-line indications for users, alerts, communications for sending files, voice, video, etc.
- IM communications include any communications made for the purpose of instant messaging.
- IM clients 102 are IM clients of any network implementation.
- the network implementations may include MSN, AIM, Yahoo!, ICQ, SMS, IBM/Lotus Sametime, Microsoft Exchange 2000, Microsoft RTC, Reuters Messaging, Bloomberg, and the like.
- IM clients 102 of a particular network implementation communicate with each other through an IM network for the network implementation.
- An IM network is any network that is configured to allow instant messaging for a particular network implementation.
- Network 104 is any network that can support instant messaging.
- network 104 includes an enterprise local area network, an extranet, etc.
- network 104 forms an enterprise network that is defined by firewall 108 .
- any devices behind firewall 108 are considered part of the enterprise network and other devices outside of firewall 108 are considered to be outside of the enterprise network.
- IM clients 102 and IM module 106 are considered part of the enterprise network.
- firewall 108 is shown, it will be understood that firewall 108 may not be included in system 100 .
- Network 110 is any network that is configured to support instant messaging and other communications.
- network 110 is a public IM network for a particular network implementation (e.g. AIM, MSN, Yahoo!).
- network 110 includes any IM network located outside of firewall 108 .
- network 110 may be a public IM network (AIM, MSN, Yahoo), running on top of the Internet, or in some cases a proprietary IM network, running over an extranet (e.g., a VPN built on top of the Internet).
- Network 110 thus can include an AOL commercial IM network, an MSN commercial IM network, a Yahoo! commercial IM network, etc.
- IM clients 112 are connected to network 110 .
- IM clients 112 may include similar characteristics as described with regard to IM clients 102 . However, in relation to firewall 108 , IM clients 112 are located outside of network 104 . While IM clients 112 may be located on their own enterprise network, for discussion purposes, IM clients 112 are considered public IM clients that may communicate with IM clients 102 .
- instant message (IM) module 106 is configured to receive and forward instant message communications.
- IM module 106 is a computing device, such as a server, PC, workstation, network computer, mainframe, and the like.
- IM module 106 is a software module or plug-in.
- IM module 106 may receive and forward instant message communications using different models.
- a proxy model for example, a server model, an event model, or any combination thereof may be used and will be described in more detail below. Although only these models are described, it will be understood that a person skilled in the art will appreciate other models that may be used to receive and forward messages at IM module 106 .
- IM module 106 receives instant message communications associated with IM clients 102 of various network implementations. Thus, no matter what the network implementation of each IM client 102 , IM module 106 can receive and process instant message communications sent for or from IM clients 102 .
- IM module 106 receives instant message communications from IM clients 102 , IM module 106 is configured to determine a policy that is applicable for that instant message communication.
- the policies include actions that IM module 106 may take based on the instant message communication.
- IM module 106 performs the action associated with the policy for the instant message communication. Examples of actions that may be taken include recording the instant message communication, modifying the instant message communication, blocking the instant message communication, forwarding the instant message communication. Additional actions will be described below and it will be understood that the actions are not limited to these actions and a person skilled in the art will appreciate other actions that may be taken.
- FIG. 2 illustrates an embodiment of IM module 106 .
- IM module 106 includes a transceiver module 200 , a filter module 202 , a policy module 204 , and an action module 206 .
- Transceiver module 200 is configured to receive and transmit (hence the name “transceiver”, denoting the combination of “transmitter” and “receiver”) instant message communications from IM clients 102 and IM clients 112 .
- transceiver module 200 includes an inbound transceiver module 208 and an outbound transceiver module 210 .
- the inbound transceiver module 208 handles instant messaging communications on behalf of IM clients 102
- outbound transceiver module 210 handles outbound instant message communications on behalf of IM clients 112 .
- inbound transceiver module 208 receives instant message communications from IM clients 102 or sends IM communications to IM clients 102 .
- outbound transceiver module 210 receives IM communications from IM clients 112 or sends an IM communications to IM clients 112 .
- transceiver module 200 receives instant message communications through different models, such as the proxy model, server model, and event model. Although only the above models are described below, a person skilled in the art will appreciate other models that may be used to receive messages at IM module 106 .
- filter module 202 is configured to then filter the instant message communication based on its network implementation.
- filter module 202 includes one or more filters for the various network implementations. For example, an AOL filter 212 , an MSN filter 214 , a Yahoo! filter 216 , and an enterprise filter 218 may be included in filter module 202 . Although only these filters are shown in FIG. 2 , it will be understood that other filters may be included in filter module 202 .
- Each filter in filter module 202 filters instant message communications of a corresponding network implementation.
- AOL filter 212 filters instant message communications of an AOL network implementation
- MSN filter 214 filters instant communications of a MSN network implementation, and so on.
- filter module 202 converts an instant message communication received in the network implementation into an IM module format readable by policy module 204 .
- the instant message communications of different network implementations include different protocols.
- Filter module 202 filters the network implementation specific protocols for the IM communications and converts the IM communications to the IM module format.
- the IM module format is a generic format.
- the network implementation protocols may be removed in the generic format. Accordingly, an AOL instant message communication that is filtered by AOL filter 212 will be filtered into the IM module format, an MSN instant message communication will be filtered by MSN filter 214 into the IM module format, and so on.
- Policy module 204 accesses a number of policies that include actions for instant message communications.
- a policy database 220 stores the policies. As shown, policy database 220 is located in policy module 204 ; however, it will be understood that policy database 220 may be located anywhere in IM module 106 or be separate from IM module 106 .
- the policies in policy database 220 include actions that can be taken by instant message module 106 .
- the policies may be applied to a certain instant message communication or multiple IM communications.
- Policy module 204 determines from characteristics related to the instant message communication whether any policies in policy database 220 apply to the IM communication.
- policy module 204 may be configured to apply a disclaimer policy to all instant message communications that are received.
- the disclaimer policy may be applicable to IM communications for a user (or a group of users) in which case policy module 204 will determine that the disclaimer policy applies to IM communications for the user (or a group of users) when received.
- file transfers from IM clients 112 are scanned by a virus-checking program, while file transfers among IM clients 102 may not be scanned for viruses.
- certain groups of users are restricted from performing file transfers.
- certain IM content is detected, causing automatic prohibition of that message's transmission and/or an alert (via IM, email, etc.) sent to an administrator.
- action module 206 is configured to perform the action corresponding to the determined policy. For example, action module 206 may add a disclaimer to the instant message. Additionally, action module 206 may take one or more action(s) including but not limited to: storing the instant message, modifying the instant message, blocking the instant message, and forwarding the instant message, etc. Once the action is taken, the instant message communication is sent back to transceiver module 200 , which may send the instant message to the applicable IM client assuming that the IM message was not blocked by action module 206 . If the message is blocked, IM module 106 will not forward the instant message communication.
- a database 222 may be used to store information usable for instant message module 106 .
- Database 222 may be included in instant message module 106 or be separate from instant message module 106 .
- database 222 includes one or more information items including but not limited to: client identifications for IM clients 102 , mapping information for IM clients 102 , and policies that may be implemented by policy module 204 . This information is used by modules in IM module 106 for any purpose.
- IM module 106 may be implemented in a proxy server model, a server model, an event model, or any combination thereof.
- IM module 106 is situated in network 104 and acts as a proxy server between IM clients 102 and network 110 .
- IM module 106 supports any kind of enterprise proxy protocols, such as SOCKS, HTTP, HTTPS.
- IM module 106 intercepts IM communications.
- IM clients 102 connect to IM module 106 by specifying IM module's 106 host and port in the proxy settings of IM clients 102 .
- IM module 106 then connects to network 110 on behalf of IM clients 102 .
- IM module 106 then connects to other IM clients (e.g., other IM clients 102 and/or network 110 in order to reach IM clients 112 ) for an IM client 102 .
- IM module 106 in the proxy server model, a request is received by IM module 106 .
- IM module 106 thus intercepts and processes the received IM communications, and then sends the response to network 110 or network 104 via SOCKS, or HTTP, or HTTPS (if necessary), or directly to network 110 or network 104 .
- IM module 106 does not appear as a proxy for IM clients 102 . Instead, IM clients 102 connect to IM module 106 in a client-to-server fashion. For example, IM clients 102 may connect using a protocol that is specially defined for use between the given IM client 102 and IM module 106 .
- IM module 106 interacts with another IM server, such as an enterprise IM server that is deployed on network 104 .
- the enterprise IM server is responsible for sending events to IM module 106 .
- the events indicate that something related to instant messaging has taken place in the enterprise IM server (e.g., an IM client signed on/off; an IM client sent a text message to another IM client; an IM client has joined/left a chat room; the presence status of an IM client has changed; or the geographical location of an IM client has changed).
- IM module 106 may access the enterprise IM server through an interface (typically an application programmer's interface, or API for short) that allows IM module 106 to gain control of enterprise IM server functions.
- IM module 106 thus receives events encapsulating various details concerning instant message communications. If IM module 106 determines an action should be taken, IM module 106 can take the action by controlling the IM server through the API.
- an IM communication may be sent by the enterprise IM client 102 to the enterprise IM server.
- the enterprise IM server Upon receiving the IM communication, the enterprise IM server sends the corresponding event to IM module 106 .
- IM module 106 intercepts the event, which includes the IM communication, and may then process the intercepted IM communication according to any applicable policies.
- FIG. 3 illustrates one embodiment of an instant message system 300 .
- This embodiment includes public IM clients 302 for one or more public IM network implementations and private IM clients 304 for one or more private IM network implementations.
- FIG. 3 includes an enterprise IM server 306 , an event adapter 308 and an event listener 310 .
- Enterprise IM server 306 handles IM communications for enterprise clients 304 .
- Enterprise IM server 306 also includes an API 312 that allows IM module 106 to access functions and controls of enterprise IM server 306 .
- enterprise IM server 306 When enterprise IM server 306 receives an IM communication, enterprise IM server 306 sends an indication through event adapter 308 to indicate that an event has occurred. Event listener 310 receives the indication and alerts IM module 106 of the event. IM module 106 then connects to enterprise IM server 306 through API 312 to intercept and receive the IM communication. IM module 106 then can process the IM communication as described above.
- IM module 106 may also be configured in the proxy server model or server model for public IM clients 302 .
- Public IM clients 302 connect to IM module 106 through methods described above, which allows IM module 106 to intercept IM communications to and from IM clients 302 .
- IM module 106 also forwards the IM communications to and from IM clients 302 and connects to network 110 on behalf of IM clients 302 .
- FIG. 4 depicts a simplified flow chart 400 of a method for managing instant message communications according to one embodiment of the present invention.
- IM module 106 receives an instant message communication of a network implementation.
- the IM communications may be in any network implementation.
- IM module 106 may receive the IM communication through the proxy, event, and/or server models.
- IM module 106 filters the IM communication in the network implementation into an IM module format.
- the IM module format may be a generic format.
- protocols that are associated with each of the network implementations are filtered from the IM communications. For example, AOL IM communications are filtered through AOL filter 212 , MSN IM communications are filtered through MSN filter 214 , and so on.
- IM module 106 determines a policy from a group of policies that is applicable for the IM communication in the IM module format.
- policies are stored in policy database 220 and appropriate policies are retrieved based on characteristics of the IM communication. Also, IM module 106 may retrieve multiple policies for the IM communication.
- IM module 106 performs an action associated with the applicable policy for the IM communication. As discussed above, various actions, such as recording portions of the IM communication, modifying the IM communication, blocking the IM communication, and forwarding the IM communication, may be taken by IM module 106 .
- IM module 106 may be used as an auditor for an enterprise. Some enterprises may be subjected to regulation and auditing of all conversations among employees, and between employees and outsiders. Thus, even instant message communications by employees are recorded.
- IM module 106 may be configured to manage instant message communications of enterprise employees using IM clients 102 and perform the action of recording the content of all IM communications. Accordingly, the enterprise will be in compliance with regulations for recordings of all conversations with regard to instant messages.
- IM module 106 may also be configured to store and reproduce any or all IM communications involving employees using IM clients 102 in their entirety. Additionally, reports showing the IM communications and when they occurred may also be produced.
- IM module 106 may be used to produce comprehensive reports on employee's usage of IM clients 102 .
- IM module 106 will perform the action of storing all IM communications from IM clients 102 of different network implementations.
- IM module 106 is able to record the employee's IM usage. The enterprise can thus monitor employee IM usage and its affect on employee productivity.
- IM module 106 may be used in securing an enterprise network.
- IM module 106 may monitor IM communications to and from IM clients 102 and perform the action of a virus check or a check for other potential hazards associated with IM communications.
- IM module 106 may monitor IM communications for spam. In this case, IM module 106 processes IM communications to determine whether some IM communications are spam. If spam is detected, the IM communications are then flagged, blocked, or sent to a spam message folder. Other actions can be taken as well, e.g., alerting the administrator.
- IM module 106 may provide access control for network 104 .
- IM module 106 may impose control of principal communication features, such as sign-on privileges, internal enterprise routing or external routing, alerts, file transfers, chatting, and news/stock tickers, for each user using IM clients 102 .
- IM module 106 may receive an IM communication from an IM client 102 with a request for logging onto an IM network.
- IM module 106 will then determine the sign-on privileges for the user and determine whether the user should be allowed to sign onto the IM network.
- IM module 106 will then perform the action of allowing the user to sign-on or blocking the user from signing on.
- IM module 106 may be used to map network identities, also known as buddy names or screen names, to corporate identities of the users of IM clients 102 .
- a user may have a corporate identity that is used for other enterprise applications, such as email.
- IM module 106 will include a policy that will map the IM network identity to the corporate identity for the user.
- corporate identities may be mapped to identities used in commercial IM networks, allowing IT administrators to have a consistent view of how employees use the company's LAN (consistent in that a view includes all of a user's IM IDs associated with their assigned and recognized corporate ID). Otherwise, the administrator would have to track each network identity on public IM networks.
- IM module 106 may be used as a foundational platform for building other applications.
- an automated call distribution (ACD) contact center application server may be implemented in an enterprise network to receive IM communications for the enterprise through a “universal-representative” identification.
- ACD automated call distribution
- the universal-representative identification associated with the ACD server may be assigned to receive IM communications as a concentrator for the entire organization.
- This universal-representative (or universal-agent) identification may be thought of as a “1-800” telephone number that outside users can use.
- outside users contact the ACD server through the universal-agent identification, but internally agents are selected according to their corporate identifications and business policies.
- a help desk identity may be established where an IM communication is sent to the help desk identity and then IM module 106 maps the help desk identity to multiple users that are working on the help desk and sends the instant message communication to all the help desk users of IM clients 102 . The users may then choose to help the patrons to answer the question that was sent to the help desk identity.
- IM module 106 may use sequential routing for the group of enterprise users (in this example, help desk agents), where IM module 106 contacts each user of a group in a pre-determined order until a user responds. IM module 106 then connects the responding user to the customer and they can exchange instant messages. Also, a broadcast routing may be implemented by IM module 106 where all members of a group are contacted at once and the user responds as soon as selected and connected for communicating with a customer.
- IM message module 106 then receives the IM communication through the universal identification and can map the universal identification to another user using any IM client 102 .
- the mapping for the universal identification is implemented according to a policy and an action maps the universal identification to other identifications.
- IM module 106 can map the IM communication for the universal-representative identification to specific identifications for the help desk.
- polices may be set up to map the universal-agent identification to specific users depending on the hours of the day and when the users both are scheduled to work.
- IM module 106 performs the action of managing presence for users.
- IM module 106 receives presence and availability information (in some cases location information as well) that is associated with the user's network identity in IM communications.
- An identity with presence, availability, and other auxiliary information associated with it may be referred to as a “presentity” (i.e., “identity with presence”).
- the presentity may become a group presentity when multiple users' identities with presence information are mapped to a (virtual) group identity.
- the presence status of an IM client may indicate that the IM client is on-line, off-line, busy, unavailable, on a mobile device, or other status-related information.
- the presence status may include geographic location information.
- IM module 106 may receive IM communications indicating the presence status of IM clients 102 on network 104 , IM clients 112 on network 110 , and IM clients 304 on network 306 .
- IM module 106 may provide and utilize an API to manage individual presentities and group presentities.
- the presence API makes generic the presence information obtained in received IM communications containing the presence status of individual users and groups of users.
- IM module 106 may also encapsulate the management of individual and group presentities for various commercial and enterprise networks in a dedicated component, such as “an IM Gateway” or “an IM Bridge”.
- IM module 106 may be used by IM module 106 where presentities (i.e., individual and groups of IM clients 102 on network 104 , IM clients 112 on network 110 , and IM clients 304 on network 306 ) are managed. For example, IM module 106 may receive an IM communication indicating a change in the presence status of IM client 102 , such as going from on-line status to off-line status. Depending on a policy applicable for that IM client 102 , IM module 106 takes an action.
- presentities i.e., individual and groups of IM clients 102 on network 104 , IM clients 112 on network 110 , and IM clients 304 on network 306 .
- IM module 106 may receive an IM communication indicating a change in the presence status of IM client 102 , such as going from on-line status to off-line status.
- IM module 106 takes an action.
- an action may include connecting a first IM client trying to communicate with a second IM client with a different user of a third IM client because the second IM client presence status indicates the user is off-line, while the third IM client presence status indicates the user is on-line (i.e., the third user is present and available). For the ACD scenario described above, this could be interpreted as connecting the outside user to an available internal agent, such as the assistant of the agent who became unavailable.
- Another type of action based on a change in the presence status of a single IM client 102 , may include changing the status of a group presentity. For example, identities of IM clients 102 may be mapped to a help desk identity (which is a group of agents).
- IM module 106 may take an action for the help desk group presentity based on a policy. If the presence status for an IM client 102 is on-line, then IM module 106 may make the presence status of the help desk presentity to be on-line. Accordingly, presence may be mapped between an identity for an IM client 102 and other identities. Moreover, presence may be mapped across multiple IM clients 102 of different network implementations.
- a session is defined as the information associated with a client connected to a server. For example, a telephone connected to a call center is in session, until one side or the other hangs up.
- an interaction When two clients engage in a live conversation (voice, text, etc.), this is called an interaction.
- a session starts when the client signs on. During that time, the client may engage in interactions with other clients (that is, conversations containing one or more messages exchanged among the parties), receive alerts, change availability status, and so on. The session ends when the client signs off. Individual clients are presentities, and groups of clients are group presentities.
- IM module 106 treats presentities, sessions, and interactions generically (possibly accessible via an API), it is possible to develop applications (such as the ACD system described above) that manage communications, flowing across these diverse media channels, in a unified way.
- applications such as the ACD system described above
- text messaging, email, voice-over-IP (VoIP), and video are just different types of interaction media. While the media have differences (real-time or delayed-response, full-duplex or one-way, specific device types required, etc.), they can be managed uniformly (clients connect and disconnect, interactions start and stop, data flows across) for the identities involved.
- IM module 106 may take the action of providing an IM alert.
- IM module 106 receives an IM communication that indicates IM module 106 should send an alert to a particular IM client 102 or a group of IM clients 102 .
- IM module 106 sends an instant message as a reminder for users of particular IM clients 102 . For example, if a meeting is scheduled at 11:00 a.m., IM module 106 may receive an IM communication indicating IM module 106 should perform the action of sending an instant message to IM clients 102 that are participating in the meeting.
- IM module 106 performs the actions of implementing various business policies to IM communications. For example, IM module 106 then performs the action of examining messages as they travel between IM clients for objectionable content and other violations. In another example, IM module 106 may receive the IM communication, examine the communication for keywords that have been deemed objectionable and flag the IM communication if the keywords are found.
- IM module 106 may prevent IM communications from being sent and/or reaching their intended IM clients. In this case, IM module 106 may determine from the IM communication that IM communications to the recipient are not allowed. IM module 106 will then block the IM communication.
- IM module 106 may allow employees connected to the enterprise network to share files or block employees' IM clients 102 from sharing files with outside IM networks 110 .
- IM module 106 may enforce a policy for internal routing, where IM module 106 allows IM communications between employees behind the enterprise firewall. If an IM communication is for an external IM client 112 , IM module 106 may block the IM communication. This is useful for intellectual property protection, among other benefits.
- a disclaimer may be added periodically or when an IM client starts interacting with another IM client for the first time.
- IM module 106 uses its position in between an enterprise firewall and IM clients 102 used by employees of the enterprise to manage IM communications to and from the IM clients.
- IM module 106 receives IM communications for the enterprise and processes the communications according to policies implemented by the enterprise. Actions are then taken by IM module 106 according to the policies.
- An enterprise using IM module 106 can thus manage all IM communications no matter what the network implementation of the IM communications, because IM module 106 is situated to receive all IM communications.
- IMs instant messages
- An IM module is provided that receives the IM messages and may issue a challenge IM to the sender of the IM.
- the challenge IM requires a response in which a sender can send a response IM with an answer. If the answer satisfies an answer required for the challenge IM, the IM module may forward the originally sent IM to the IM client.
- spam bots e.g., software programs, processes, or machines
- a bot when a challenge IM is issued for an IM received, typically a bot cannot respond to it (at least not likely with a correct answer).
- a response is not received (or if the response does not contain the correct answer to the challenge)
- the human user should be able to respond to the challenge IM with the correct answer.
- FIG. 5 depicts a simplified flowchart 500 for processing IM messages according to one embodiment of the present invention.
- IM module 106 detects a contact list for IM client 102 .
- the contact list may be a buddy list or any other list of users that are authorized to contact the IM client 102 .
- the contact list is detected when a user logs on using an IM client. By logging on, a user may enter their IM screen name or any other user information to log onto an IM network.
- a contact list is sent to the provider of the IM network.
- IM module 106 detects this contact list and stores a copy of it.
- an IM for IM client 102 is received.
- an IM is sent to a username associated with the IM client.
- a username may be “Alex”.
- An IM may then be sent to that username “Alex” on the IM network.
- a username for a sender of the IM is determined.
- the username represents the sender's identity on the IM network, over which the communication is taking place.
- IM module 106 is able to determine the username IM network identity information) of IM clients 102 outside of the enterprise (and not just of IM clients 102 inside the enterprise).
- the IM username of the entity that sent the IM is known by IM module 106 .
- the allowed username may be on a contact list for IM client 102 .
- a larger contact list that includes other names not on the user's contact list may be used.
- a corporate contact list or any other names that may be deemed safe may be added to the contact list.
- a global contact list including usernames for contact lists of all IM clients 102 used in a corporate network may be used as a contact list for the IM client 102 .
- the IM may be sent. If the username is not allowed, in step 512 , a challenge IM is issued. In one embodiment, the challenge IM is sent to the username of the sender of the IM. The challenge IM is used to determine if the IM message should be allowed and forwarded to a user. The challenge IM may ask a question that requires an answer. Alternatively, the challenge message may just require a response IM to be sent without any restrictions on its content (e.g., if no particular answer is required, but just something, such as “123”, sent back).
- the IM if a response to the challenge IM is not received, the IM is blocked. If an acceptable response to the challenge is received, then the IM message is forwarded to the IM client. Additionally, as will be described below, other actions may be taken.
- FIG. 6 depicts a system 600 for processing IM messages according to one embodiment of the present invention.
- IM module 106 receives all IM messages sent by IM clients 112 for IM clients 102 . As shown, three IMs are sent for three different IM clients 102 . For each IM received, it is determined that a challenge message should be sent. Thus, the usernames from which the IMs were sent are not on a contact list associated with each destination IM client 102 . As shown, challenge messages sent to IM clients 112 - 1 and 112 - 2 are received and an answer is sent to IM module 106 .
- IM # 1 and IM # 2 are forwarded to clients 102 - 1 and 102 - 2 , respectively.
- the answer may be the wrong answer and the IM may be blocked.
- IM # 3 is blocked from being forwarded to client 102 - 3 .
- IM module 106 manages all IMs sent to IM clients 102 .
- IM module 106 may manage all IM messages for a corporate network or entity.
- spam may be controlled for an entire network of IM clients 102 .
- FIG. 7 depicts an embodiment of IM module 106 according to embodiments of the present invention.
- IM module 106 includes receiver module 200 , filter module 202 , policy module 204 , and action module 206 . These modules are included in other embodiments described previously, it will be understood that these modules may include the components described previously in addition to the components described herein.
- Receiver module 200 includes an inbound IM processor 208 and an outbound IM processor 210 . Also, a database 702 is used to store IM messages received. Outbound receiver 210 detects a contact list from an IM client 102 when a user logs on using an IM username. The contact list may be detected at other times though, such as when the buddy list is changed.
- a contact list detector 704 determines that a contact list is received by outbound receiver 210 and stores the contact list in a contact list database 706 . The contact list may then be used to determine if IM messages are from users in that contact list when they are received. In an embodiment, a contact list may not be detected every time a user logs on. Rather, a global contact list for an entire organization may be used.
- An inbound message processor 208 receives an IM from IM client 112 .
- the IM is stored in IM database 702 , even if it is determined as spam (or spim) and not forwarded to an IM client 102 .
- an IM may be received from the IM client 102 .
- the IM is from an IM client that is internal to the network.
- the IM client may be situated in the same corporate network.
- IM module 106 may be configured to forward these IMs to the destination IM client 102 without checking whether or not the IM was spam (or spim).
- a username detector 708 detects the username associated with the IM message received. In one embodiment, a username detector 708 parses the IM protocol message to determine the username that sent the IM. The username is then sent to policy module 204 .
- Policy module 204 then uses a policy for issuing challenges to determine if a challenge message should be sent. Policy module 204 determines whether a challenge should be issued based on one or more policies. For example, a policy may be all usernames may be challenged except if the usernames fall within certain categories.
- categories may be users who are on the contact list of the username being contacted, users who access IM networks through a specific IM module deployment, users who access IM networks through a federated IM module (i.e., several IM modules within the same business or among multiple businesses that have some sort of a trust relationship among them may be referred to as federated IM modules), users who are explicitly placed on a configurable contact list (or configurable contact lists) in IM Module 106 , users who are explicitly given challenge/response keys (e.g., opted in software agents/bots that are considered legitimate or used by the organization), and the like.
- federated IM module i.e., several IM modules within the same business or among multiple businesses that have some sort of a trust relationship among them may be referred to as federated IM modules
- users who are explicitly placed on a configurable contact list (or configurable contact lists) in IM Module 106 users who are explicitly given challenge/response keys (e.g., opted
- IM module 106 may be configured to insert a disclaimer into an IM and that disclaimer may be detected by policy module 204 . Also, other signatures or information may be used to determine if the message was sent to an IM module 106 .
- a federated IM module 106 is defined as being one among a number of IM modules that have some sort of a trust relationship among them. Typically, these are IM modules 106 at the organization and its partner and/or customer organizations.
- IM Module 106 Users who are explicitly added to a configurable contact list (or configurable contact lists) in IM Module 106 may also be allowed. For example, friends of a corporation, opted in software agents/bots that are considered legitimate and/or useful by the organization may be included in a contact list in database 706 . Thus, not all IM messages from bots may be challenged if they are deemed useful or allowable.
- IM messages sent by these users are not issued challenges and are sent to IM clients 102 .
- the contact list found in IM database 706 is also dynamic. For example, configuration changes may take place in real-time. If one or more of the above conditions changes, the changes are updated to contact list in database 706 . For example, if one or more IM usernames are removed or added to an IM contact list for an IM client in the IM network, those changes are detected and realized in a contact list in IM module 106 as well as in database 706 , if needed.
- action module 206 is sent the username and a challenge issuer 710 is configured to issue a challenge.
- challenge issuer 710 may determine the format of the challenge to be sent based on the destination IM client 102 , the sender of IM, or any other factors. Additionally, a pre-set challenge IM may be configured for all IM messages received.
- One challenge format is plain text, wherein a question would be formulated (e.g., “please type ‘facetime’ on a line by itself”). More advanced formats, such as IMs that include images or links are also possible.
- a response IM may be received from the IM client that received the challenge IM at a challenge response analyzer 712 . Also, a response to the challenge IM may not be received. For example, a bot may not know how to respond to a challenge IM sent to it.
- challenge response analyzer 712 reviews the response and determines if the response IM satisfies an answer that is expected from the response.
- receiving a response IM for the challenge IM may be sufficient to allow the initial IM sent to be forwarded to its destination (intended recipient).
- a question may have been asked, to which an answer may be required.
- a personal question related to the destination username may be sent.
- the message may ask a user to type in a word or phrase that is shown on the screen.
- the response IM is then analyzed to determine if the response IM has the correct answer required.
- the initial IM received is blocked.
- a time limit may be set for receiving a response message. For example, if response message is not sent in ten seconds, the IM is blocked. In addition, the maximum number of wrong answers allowed may be set, beyond which the challenged IM username is blocked for a significant period of time. Other response processing policies are also possible.
- FIG. 8 depicts a simplified flowchart 800 of a method for processing responses to challenge IMs according to one embodiment of the present invention.
- the method assumes that an IM has been received for a destination IM client or a challenge IM has been sent to the sender.
- step 802 it is determined if a response IM is received for the challenge IM. If a response IM is not received, the method proceeds to step 816 where the IM is blocked.
- there may be a time limit where if a response is not received within that time limit, it is determined that a response is not received and the IM is blocked in step 816 .
- Other response processing policies are also possible.
- a response it is determined whether or not the response contains the correct answer for the challenge.
- the message may ask a user to type in a word or phrase that is shown on the screen.
- a challenge may be an image containing a handwritten word that needs to be replicated in the response.
- the destination IM client is prompted with a message indicating that an IM was sent from a username and asking if the user wants to accept the IM.
- a message may be “An IM has been received from a user “Alex”, the user has satisfied the challenge, do you want to accept the IM?”
- this step may be skipped and the IM message may be automatically forwarded to the IM client.
- the user is given the option to reject the IM.
- step 808 it is determined if the destination IM client 102 accepted the IM. If it is not accepted, in step 816 , the IM is blocked.
- the original IM that was sent is retrieved from the computer memory (or possibly from database 702 , or any other storage area) for the purposes of forwarding it to its intended destination recipient. Because the challenge IM was issued, the original IM was not immediately forwarded to its intended destination recipient in the anticipation of the response to the challenge and the need to determine whether or not the response is correct. Since IM module 106 is capable of storing received IMs, it can monitor the potentially spam (or spim) traffic and provide the means to display (e.g., by the means of convenient Web-based reports) unsuccessful responses to challenges for a subsequent review by authorized personnel.
- the IM is forwarded to the destination IM client 102 . Accordingly, in one embodiment, the IM is not sent in real-time, but rather stored for a moment inside IM module 106 , while IM module 106 communicates with the sender of the IM message.
- the username of the sender may be added to a contact list of the destination IM client 102 or a global contact list of the organization and its partners and/or customers. This action may not be taken in some embodiments. For example, the affirmative addition of the username by a user of IM client 102 itself may be necessary. Thus, the user permits the sender to be on their contact list and manually adds them. However, IM module 106 may determine that since the user accepted this IM, other IMs from the sender should be directly forwarded to the user's IM client 102 .
- a user may attempt to add a contact to his/her buddy list.
- a signal for adding the contact to the buddy list is intercepted by IM module 104 .
- IM module 104 may not allow the immediate addition of the contact to the user's buddy list.
- IM module 104 may perform an action, such as sending a message like a challenge message that requires additional input from the user.
- a link may be sent to the user's IM client 102 .
- the link when selected, may present a form that needs to be filled out by the user in order to get approval for adding the contact to the user's buddy list.
- the form When the form is filled out, it may be sent to IM module 104 , which may then route the form to an entity designed to approve buddy requests. The entity may then decide whether to approve or deny the buddy request. If the buddy request is approved, the user is able to add the contact to the user's buddy list.
- IM module 104 may intercept the requests and not allow the addition until approval is received. A message may also be sent to the user's IM client 102 indicating that the approval is being processed. Once the approval is given, IM module 102 may determine when the user is logged in to an IM client 102 and send an IM that the buddy request has been approved and the contact can be added. Similarly, if the request is denied, a denial IM may be sent with the reasons for denial.
- the contacts that can be subject to the approval process may be contacts in an enterprise network or outside of the enterprise network.
- the above process allows the interception of buddy list events and actions are performed related to the buddy list events.
- the approval entity may communicate with IM module 102 using any methods.
- APIs application programming interfaces
- the methods and apparatus may be used to prevent spam or unauthorized messages that are sent to IM clients. For example, challenges are issued that need to be responded to in order for the IM message to be forwarded to the IM client.
- the challenge messages may be issued in certain circumstances if, for example, a username of the sender is not on a contact list of the intended recipient (or contact lists of the others inside the organization). Because a response to a challenge message is required, automated software agents/bots typically have trouble responding to the challenge messages. Thus, messages from these automated software agents/bots may be prevented by issuing the challenges.
- Policies are included in a central IM module that detect contact lists for IM clients and determine when to send challenge messages.
- IM module 106 that can receive and filter IM messages from different IM networks, a solution for all IM clients of a corporate network may be provided by IM module 106 . Also, because the IM module is configured to process IMs from different network providers, spam in different network formats may be prevented using challenges.
- control logic may also be stored on an information storage medium as instructions configured to be executed by an information processing device.
- the present invention may be implemented only in hardware, or only in software, or using combinations thereof.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims (31)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/031,123 US7899867B1 (en) | 2002-07-31 | 2005-01-07 | SpIM blocking and user approval techniques for real-time messaging networks |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/212,129 US7596599B1 (en) | 2002-07-31 | 2002-07-31 | Management capabilities for real-time messaging networks |
US60628404P | 2004-08-31 | 2004-08-31 | |
US11/031,123 US7899867B1 (en) | 2002-07-31 | 2005-01-07 | SpIM blocking and user approval techniques for real-time messaging networks |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/212,129 Continuation-In-Part US7596599B1 (en) | 2002-07-31 | 2002-07-31 | Management capabilities for real-time messaging networks |
Publications (1)
Publication Number | Publication Date |
---|---|
US7899867B1 true US7899867B1 (en) | 2011-03-01 |
Family
ID=43617399
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/031,123 Active 2025-06-25 US7899867B1 (en) | 2002-07-31 | 2005-01-07 | SpIM blocking and user approval techniques for real-time messaging networks |
Country Status (1)
Country | Link |
---|---|
US (1) | US7899867B1 (en) |
Cited By (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070169184A1 (en) * | 2006-01-13 | 2007-07-19 | Fortinet, Inc. | Computerized system and method for advanced network content processing |
US20080126482A1 (en) * | 2006-11-27 | 2008-05-29 | O'sullivan Patrick | Trusted contact name validation |
US20080196099A1 (en) * | 2002-06-10 | 2008-08-14 | Akonix Systems, Inc. | Systems and methods for detecting and blocking malicious content in instant messages |
US20090125902A1 (en) * | 2007-03-01 | 2009-05-14 | Ghosh Anup K | On-demand disposable virtual work system |
US20100122343A1 (en) * | 2008-09-12 | 2010-05-13 | Anup Ghosh | Distributed Sensor for Detecting Malicious Software |
US20110099620A1 (en) * | 2009-04-09 | 2011-04-28 | Angelos Stavrou | Malware Detector |
US20110131653A1 (en) * | 2002-06-10 | 2011-06-02 | Quest Software, Inc. | Systems and methods for managing messages in an enterprise network |
US20110167492A1 (en) * | 2009-06-30 | 2011-07-07 | Ghosh Anup K | Virtual Browsing Environment |
US20120150959A1 (en) * | 2010-12-14 | 2012-06-14 | Electronics And Telecommunications Research Institute | Spam countering method and apparatus |
US8285856B1 (en) | 2004-07-23 | 2012-10-09 | Verizon Data Services Llc | Methods and systems for integrating a messaging service with an application |
US8347203B1 (en) | 2004-07-23 | 2013-01-01 | Verizon Data Services Llc | Methods and systems for defining a form navigational structure |
US8407188B1 (en) | 2003-07-25 | 2013-03-26 | Verizon Data Services Llc | Methods and systems for providing data form management |
US20130080552A1 (en) * | 2005-04-04 | 2013-03-28 | Jay D. Logue | Federated Challenge Credit System |
US8645547B1 (en) * | 2003-07-25 | 2014-02-04 | Verizon Data Services Llc | Methods and systems for providing a messaging service |
US8949943B2 (en) | 2003-12-19 | 2015-02-03 | Facebook, Inc. | Messaging systems and methods |
US9043407B1 (en) * | 2009-06-12 | 2015-05-26 | Avaya Inc. | Interactive user interface to communication-enabled business process platforms method and apparatus |
US9081959B2 (en) | 2011-12-02 | 2015-07-14 | Invincea, Inc. | Methods and apparatus for control and detection of malicious content using a sandbox environment |
US20150282233A1 (en) * | 2014-03-31 | 2015-10-01 | Takeshi Homma | Communication management system, communication management method, and recording medium storing communication management program |
US20170201474A1 (en) * | 2014-06-10 | 2017-07-13 | Netease, Inc. | Method and device for questioning and answering |
US10630535B2 (en) * | 2018-05-21 | 2020-04-21 | Qualcomm Incorporated | Notification timing for electronic devices |
US20210352059A1 (en) * | 2014-11-04 | 2021-11-11 | Huawei Technologies Co., Ltd. | Message Display Method, Apparatus, and Device |
US11196892B2 (en) | 2019-05-30 | 2021-12-07 | Microsoft Technology Licensing, Llc | Use of client compute for document processing |
US20220124094A1 (en) * | 2015-05-08 | 2022-04-21 | A10 Networks, Incorporated | Integrated bot and captcha techniques |
WO2022100246A1 (en) * | 2020-11-11 | 2022-05-19 | 中兴通讯股份有限公司 | Client device, information processing method, and computer-readable storage medium |
US11341271B2 (en) | 2019-05-30 | 2022-05-24 | Microsoft Technology Licensing, Llc | Information barriers for sensitive information |
Citations (68)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5943478A (en) | 1997-04-04 | 1999-08-24 | Flash Communications, Inc. | System for immediate popup messaging across the internet |
US5999932A (en) | 1998-01-13 | 1999-12-07 | Bright Light Technologies, Inc. | System and method for filtering unsolicited electronic mail messages using data matching and heuristic processing |
US6052372A (en) | 1996-02-14 | 2000-04-18 | British Telecommunications Public Limited Company | Method and apparatus for establishing communication |
US6199102B1 (en) * | 1997-08-26 | 2001-03-06 | Christopher Alan Cobb | Method and system for filtering electronic messages |
US6212548B1 (en) | 1998-07-30 | 2001-04-03 | At & T Corp | System and method for multiple asynchronous text chat conversations |
US6248946B1 (en) | 2000-03-01 | 2001-06-19 | Ijockey, Inc. | Multimedia content delivery system and method |
US6260148B1 (en) | 1997-04-04 | 2001-07-10 | Microsoft Corporation | Methods and systems for message forwarding and property notifications using electronic subscriptions |
US6292800B1 (en) | 1999-01-29 | 2001-09-18 | America Online | Database system |
US6301609B1 (en) | 1999-07-07 | 2001-10-09 | Lucent Technologies Inc. | Assignable associate priorities for user-definable instant messaging buddy groups |
US6308238B1 (en) | 1999-09-24 | 2001-10-23 | Akamba Corporation | System and method for managing connections between clients and a server with independent connection and data buffers |
US6336133B1 (en) | 1997-05-20 | 2002-01-01 | America Online, Inc. | Regulating users of online forums |
US6366962B1 (en) | 1998-12-18 | 2002-04-02 | Intel Corporation | Method and apparatus for a buddy list |
US6389132B1 (en) | 1999-10-13 | 2002-05-14 | Avaya Technology Corp. | Multi-tasking, web-based call center |
US6400381B1 (en) | 1999-06-11 | 2002-06-04 | International Business Machines Corporation | Web places |
US6408066B1 (en) | 1999-12-15 | 2002-06-18 | Lucent Technologies Inc. | ACD skill-based routing |
US6430602B1 (en) * | 2000-08-22 | 2002-08-06 | Active Buddy, Inc. | Method and system for interactively responding to instant messaging requests |
US20020116463A1 (en) * | 2001-02-20 | 2002-08-22 | Hart Matthew Thomas | Unwanted e-mail filtering |
US20020120600A1 (en) * | 2001-02-26 | 2002-08-29 | Schiavone Vincent J. | System and method for rule-based processing of electronic mail messages |
US6449344B1 (en) | 1996-10-06 | 2002-09-10 | Aol Acquisition Corporation | Communication system |
US20030023736A1 (en) * | 2001-07-12 | 2003-01-30 | Kurt Abkemeier | Method and system for filtering messages |
US20030028597A1 (en) * | 2001-03-14 | 2003-02-06 | Matti Salmi | Separation of instant messaging user and client identities |
US6539421B1 (en) * | 1999-09-24 | 2003-03-25 | America Online, Inc. | Messaging application user interface |
US6546416B1 (en) * | 1998-12-09 | 2003-04-08 | Infoseek Corporation | Method and system for selectively blocking delivery of bulk electronic mail |
US6549937B1 (en) * | 1999-07-21 | 2003-04-15 | Microsoft Corporation | System and method for multi-protocol communication in a computer network |
US20030125927A1 (en) | 2001-12-28 | 2003-07-03 | Microsoft Corporation | Method and system for translating instant messages |
US6609196B1 (en) * | 1997-07-24 | 2003-08-19 | Tumbleweed Communications Corp. | E-mail firewall with stored key encryption/decryption |
US6654787B1 (en) * | 1998-12-31 | 2003-11-25 | Brightmail, Incorporated | Method and apparatus for filtering e-mail |
US20030233418A1 (en) * | 2002-06-18 | 2003-12-18 | Goldman Phillip Y. | Practical techniques for reducing unsolicited electronic messages by identifying sender's addresses |
US20040015554A1 (en) * | 2002-07-16 | 2004-01-22 | Brian Wilson | Active e-mail filter with challenge-response |
US6691156B1 (en) * | 2000-03-10 | 2004-02-10 | International Business Machines Corporation | Method for restricting delivery of unsolicited E-mail |
US20040088423A1 (en) | 2002-06-10 | 2004-05-06 | Akonix Systems, Inc. | Systems and methods for authentication of target protocol screen names |
US20040103318A1 (en) | 2002-06-10 | 2004-05-27 | Akonix Systems, Inc. | Systems and methods for implementing protocol enforcement rules |
US20040109518A1 (en) | 2002-06-10 | 2004-06-10 | Akonix Systems, Inc. | Systems and methods for a protocol gateway |
US6757830B1 (en) * | 2000-10-03 | 2004-06-29 | Networks Associates Technology, Inc. | Detecting unwanted properties in received email messages |
US20040136386A1 (en) | 2002-06-10 | 2004-07-15 | Akonix Systems, Inc. | Systems and methods for reflecting messages associated with a target protocol within a network |
US20040143632A1 (en) * | 2003-01-18 | 2004-07-22 | International Business Machines Corporation | Method and system for publication of instant messaging privacy codes |
US20040143633A1 (en) * | 2003-01-18 | 2004-07-22 | International Business Machines Corporation | Instant messaging system with privacy codes |
US20040158610A1 (en) * | 2003-02-10 | 2004-08-12 | Davis Joel A. | Client proxying for instant messaging |
US20040193722A1 (en) * | 1999-08-30 | 2004-09-30 | Donovan Kevin Remington Joseph Bartholomew | Universal instant messaging system for the internet |
US20050055416A1 (en) * | 2003-09-05 | 2005-03-10 | Heikes Brian Dean | Managing instant messages |
US20050055412A1 (en) * | 2003-09-04 | 2005-03-10 | International Business Machines Corporation | Policy-based management of instant message windows |
US6868498B1 (en) * | 1999-09-01 | 2005-03-15 | Peter L. Katsikas | System for eliminating unauthorized electronic mail |
US20050187781A1 (en) * | 2004-02-25 | 2005-08-25 | Christensen Tore L. | Using business rules for determining presence |
US6965920B2 (en) * | 2000-07-12 | 2005-11-15 | Peter Henrik Pedersen | Profile responsive electronic message management system |
US6976092B1 (en) * | 2002-09-17 | 2005-12-13 | Bellsouth Intellectual Property Corp. | System that using transport protocol objects located at agent location to generate session ID and to provide translation between different instant messaging protocols |
US7016978B2 (en) * | 2002-04-29 | 2006-03-21 | Bellsouth Intellectual Property Corporation | Instant messaging architecture and system for interoperability and presence management |
US7035942B2 (en) * | 2002-09-17 | 2006-04-25 | Bellsouth Intellectual Property Corp. | Server-based message protocol translation |
US7039949B2 (en) * | 2001-12-10 | 2006-05-02 | Brian Ross Cartmell | Method and system for blocking unwanted communications |
US20060095511A1 (en) * | 2000-12-19 | 2006-05-04 | Munarriz Andrew A | Messaging protocol |
US7123706B2 (en) * | 2003-06-24 | 2006-10-17 | Nec Infrontia Corporation | Communication exchanging system capable of changing forwarding destination according to notification of presence change of user |
US7127741B2 (en) * | 1998-11-03 | 2006-10-24 | Tumbleweed Communications Corp. | Method and system for e-mail message transmission |
US7171190B2 (en) * | 2003-06-25 | 2007-01-30 | Oracle International Corporation | Intelligent messaging |
US7194516B2 (en) * | 2003-10-23 | 2007-03-20 | Microsoft Corporation | Accessing different types of electronic messages through a common messaging interface |
US7203749B2 (en) * | 2001-11-13 | 2007-04-10 | Fujitsu Limited | Contents filtering method, contents filtering apparatus and contents filtering program |
US7209957B2 (en) * | 2003-09-15 | 2007-04-24 | Sbc Knowledge Ventures, L.P. | Downloadable control policies for instant messaging usage |
US7237008B1 (en) * | 2002-05-10 | 2007-06-26 | Mcafee, Inc. | Detecting malware carried by an e-mail message |
US7263545B2 (en) * | 2003-02-14 | 2007-08-28 | Convoq, Inc. | System and method for immediate and delayed real-time communication activities using availability data from and communications through an external instant messaging system |
US7277719B2 (en) * | 2003-06-04 | 2007-10-02 | Research In Motion Limited | System and method of message transport selection |
US7310659B1 (en) * | 2003-06-27 | 2007-12-18 | Sprint Communications Company L.P. | Interface and method for extending a target application over an instant message link of a communication network |
US7321969B2 (en) * | 2002-04-26 | 2008-01-22 | Entrust Limited | Secure instant messaging system using instant messaging group policy certificates |
US7324826B2 (en) * | 2000-03-06 | 2008-01-29 | America Online, Inc. | Method and system for messaging across cellular networks and a public data network |
US7346696B2 (en) * | 2002-05-21 | 2008-03-18 | At&T Deleware Intellectual Property, Inc. | Group access management system |
US7373383B2 (en) * | 2002-12-06 | 2008-05-13 | International Business Machines Corporation | Location messaging method for delivering messages in a global virtual space |
US7441262B2 (en) * | 2002-07-11 | 2008-10-21 | Seaway Networks Inc. | Integrated VPN/firewall system |
US7461378B2 (en) * | 2002-06-11 | 2008-12-02 | Siemens Communications, Inc. | Methods and apparatus for processing an instant message |
US20090125591A1 (en) * | 2002-09-30 | 2009-05-14 | Ficus Kirkpatrick | Instant messaging proxy apparatus and method |
US7596599B1 (en) * | 2002-07-31 | 2009-09-29 | Facetime Communications, Inc. | Management capabilities for real-time messaging networks |
US20090313345A1 (en) * | 2004-05-10 | 2009-12-17 | Yahoo! Inc. | Clearinghouse for messages between disparate networks |
-
2005
- 2005-01-07 US US11/031,123 patent/US7899867B1/en active Active
Patent Citations (75)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6052372A (en) | 1996-02-14 | 2000-04-18 | British Telecommunications Public Limited Company | Method and apparatus for establishing communication |
US6449344B1 (en) | 1996-10-06 | 2002-09-10 | Aol Acquisition Corporation | Communication system |
US6260148B1 (en) | 1997-04-04 | 2001-07-10 | Microsoft Corporation | Methods and systems for message forwarding and property notifications using electronic subscriptions |
US5943478A (en) | 1997-04-04 | 1999-08-24 | Flash Communications, Inc. | System for immediate popup messaging across the internet |
US6336133B1 (en) | 1997-05-20 | 2002-01-01 | America Online, Inc. | Regulating users of online forums |
US6339784B1 (en) | 1997-05-20 | 2002-01-15 | America Online, Inc. | Self-policing, rate limiting online forums |
US6609196B1 (en) * | 1997-07-24 | 2003-08-19 | Tumbleweed Communications Corp. | E-mail firewall with stored key encryption/decryption |
US7401356B2 (en) * | 1997-07-24 | 2008-07-15 | Tumbleweed Communications Corp. | Method and system for e-mail message transmission |
US7380274B2 (en) * | 1997-07-24 | 2008-05-27 | Tumbleweed Communications Corp. | E-mail firewall |
US6199102B1 (en) * | 1997-08-26 | 2001-03-06 | Christopher Alan Cobb | Method and system for filtering electronic messages |
US5999932A (en) | 1998-01-13 | 1999-12-07 | Bright Light Technologies, Inc. | System and method for filtering unsolicited electronic mail messages using data matching and heuristic processing |
US6212548B1 (en) | 1998-07-30 | 2001-04-03 | At & T Corp | System and method for multiple asynchronous text chat conversations |
US7127741B2 (en) * | 1998-11-03 | 2006-10-24 | Tumbleweed Communications Corp. | Method and system for e-mail message transmission |
US6546416B1 (en) * | 1998-12-09 | 2003-04-08 | Infoseek Corporation | Method and system for selectively blocking delivery of bulk electronic mail |
US6366962B1 (en) | 1998-12-18 | 2002-04-02 | Intel Corporation | Method and apparatus for a buddy list |
US6654787B1 (en) * | 1998-12-31 | 2003-11-25 | Brightmail, Incorporated | Method and apparatus for filtering e-mail |
US6292800B1 (en) | 1999-01-29 | 2001-09-18 | America Online | Database system |
US6400381B1 (en) | 1999-06-11 | 2002-06-04 | International Business Machines Corporation | Web places |
US6301609B1 (en) | 1999-07-07 | 2001-10-09 | Lucent Technologies Inc. | Assignable associate priorities for user-definable instant messaging buddy groups |
US6549937B1 (en) * | 1999-07-21 | 2003-04-15 | Microsoft Corporation | System and method for multi-protocol communication in a computer network |
US20040193722A1 (en) * | 1999-08-30 | 2004-09-30 | Donovan Kevin Remington Joseph Bartholomew | Universal instant messaging system for the internet |
US6868498B1 (en) * | 1999-09-01 | 2005-03-15 | Peter L. Katsikas | System for eliminating unauthorized electronic mail |
US6539421B1 (en) * | 1999-09-24 | 2003-03-25 | America Online, Inc. | Messaging application user interface |
US6308238B1 (en) | 1999-09-24 | 2001-10-23 | Akamba Corporation | System and method for managing connections between clients and a server with independent connection and data buffers |
US6389132B1 (en) | 1999-10-13 | 2002-05-14 | Avaya Technology Corp. | Multi-tasking, web-based call center |
US6408066B1 (en) | 1999-12-15 | 2002-06-18 | Lucent Technologies Inc. | ACD skill-based routing |
US6248946B1 (en) | 2000-03-01 | 2001-06-19 | Ijockey, Inc. | Multimedia content delivery system and method |
US7324826B2 (en) * | 2000-03-06 | 2008-01-29 | America Online, Inc. | Method and system for messaging across cellular networks and a public data network |
US6691156B1 (en) * | 2000-03-10 | 2004-02-10 | International Business Machines Corporation | Method for restricting delivery of unsolicited E-mail |
US6965920B2 (en) * | 2000-07-12 | 2005-11-15 | Peter Henrik Pedersen | Profile responsive electronic message management system |
US6430602B1 (en) * | 2000-08-22 | 2002-08-06 | Active Buddy, Inc. | Method and system for interactively responding to instant messaging requests |
US6757830B1 (en) * | 2000-10-03 | 2004-06-29 | Networks Associates Technology, Inc. | Detecting unwanted properties in received email messages |
US20060095511A1 (en) * | 2000-12-19 | 2006-05-04 | Munarriz Andrew A | Messaging protocol |
US20020116463A1 (en) * | 2001-02-20 | 2002-08-22 | Hart Matthew Thomas | Unwanted e-mail filtering |
US20020120600A1 (en) * | 2001-02-26 | 2002-08-29 | Schiavone Vincent J. | System and method for rule-based processing of electronic mail messages |
US20030028597A1 (en) * | 2001-03-14 | 2003-02-06 | Matti Salmi | Separation of instant messaging user and client identities |
US20030023736A1 (en) * | 2001-07-12 | 2003-01-30 | Kurt Abkemeier | Method and system for filtering messages |
US7203749B2 (en) * | 2001-11-13 | 2007-04-10 | Fujitsu Limited | Contents filtering method, contents filtering apparatus and contents filtering program |
US7039949B2 (en) * | 2001-12-10 | 2006-05-02 | Brian Ross Cartmell | Method and system for blocking unwanted communications |
US20030125927A1 (en) | 2001-12-28 | 2003-07-03 | Microsoft Corporation | Method and system for translating instant messages |
US7321969B2 (en) * | 2002-04-26 | 2008-01-22 | Entrust Limited | Secure instant messaging system using instant messaging group policy certificates |
US7603467B2 (en) * | 2002-04-29 | 2009-10-13 | At&T Intellectual Property I, L.P. | Instant messaging architecture and system for interoperability and presence management |
US7016978B2 (en) * | 2002-04-29 | 2006-03-21 | Bellsouth Intellectual Property Corporation | Instant messaging architecture and system for interoperability and presence management |
US7237008B1 (en) * | 2002-05-10 | 2007-06-26 | Mcafee, Inc. | Detecting malware carried by an e-mail message |
US7346696B2 (en) * | 2002-05-21 | 2008-03-18 | At&T Deleware Intellectual Property, Inc. | Group access management system |
US20040136386A1 (en) | 2002-06-10 | 2004-07-15 | Akonix Systems, Inc. | Systems and methods for reflecting messages associated with a target protocol within a network |
US20040111623A1 (en) | 2002-06-10 | 2004-06-10 | Akonix Systems, Inc. | Systems and methods for detecting user presence |
US20040109518A1 (en) | 2002-06-10 | 2004-06-10 | Akonix Systems, Inc. | Systems and methods for a protocol gateway |
US20040103318A1 (en) | 2002-06-10 | 2004-05-27 | Akonix Systems, Inc. | Systems and methods for implementing protocol enforcement rules |
US20040088423A1 (en) | 2002-06-10 | 2004-05-06 | Akonix Systems, Inc. | Systems and methods for authentication of target protocol screen names |
US7461378B2 (en) * | 2002-06-11 | 2008-12-02 | Siemens Communications, Inc. | Methods and apparatus for processing an instant message |
US20030233418A1 (en) * | 2002-06-18 | 2003-12-18 | Goldman Phillip Y. | Practical techniques for reducing unsolicited electronic messages by identifying sender's addresses |
US7441262B2 (en) * | 2002-07-11 | 2008-10-21 | Seaway Networks Inc. | Integrated VPN/firewall system |
US20040015554A1 (en) * | 2002-07-16 | 2004-01-22 | Brian Wilson | Active e-mail filter with challenge-response |
US7596599B1 (en) * | 2002-07-31 | 2009-09-29 | Facetime Communications, Inc. | Management capabilities for real-time messaging networks |
US6976092B1 (en) * | 2002-09-17 | 2005-12-13 | Bellsouth Intellectual Property Corp. | System that using transport protocol objects located at agent location to generate session ID and to provide translation between different instant messaging protocols |
US7035942B2 (en) * | 2002-09-17 | 2006-04-25 | Bellsouth Intellectual Property Corp. | Server-based message protocol translation |
US20090125591A1 (en) * | 2002-09-30 | 2009-05-14 | Ficus Kirkpatrick | Instant messaging proxy apparatus and method |
US7373383B2 (en) * | 2002-12-06 | 2008-05-13 | International Business Machines Corporation | Location messaging method for delivering messages in a global virtual space |
US20040143632A1 (en) * | 2003-01-18 | 2004-07-22 | International Business Machines Corporation | Method and system for publication of instant messaging privacy codes |
US20040143633A1 (en) * | 2003-01-18 | 2004-07-22 | International Business Machines Corporation | Instant messaging system with privacy codes |
US20040158610A1 (en) * | 2003-02-10 | 2004-08-12 | Davis Joel A. | Client proxying for instant messaging |
US7263545B2 (en) * | 2003-02-14 | 2007-08-28 | Convoq, Inc. | System and method for immediate and delayed real-time communication activities using availability data from and communications through an external instant messaging system |
US7277719B2 (en) * | 2003-06-04 | 2007-10-02 | Research In Motion Limited | System and method of message transport selection |
US7123706B2 (en) * | 2003-06-24 | 2006-10-17 | Nec Infrontia Corporation | Communication exchanging system capable of changing forwarding destination according to notification of presence change of user |
US7171190B2 (en) * | 2003-06-25 | 2007-01-30 | Oracle International Corporation | Intelligent messaging |
US7620408B2 (en) * | 2003-06-25 | 2009-11-17 | Oracle International Corporation | Intelligent messaging |
US7310659B1 (en) * | 2003-06-27 | 2007-12-18 | Sprint Communications Company L.P. | Interface and method for extending a target application over an instant message link of a communication network |
US20050055412A1 (en) * | 2003-09-04 | 2005-03-10 | International Business Machines Corporation | Policy-based management of instant message windows |
US20050055416A1 (en) * | 2003-09-05 | 2005-03-10 | Heikes Brian Dean | Managing instant messages |
US20070214001A1 (en) * | 2003-09-15 | 2007-09-13 | Sbc Knowledge Ventures, Lp | Downloadable control policies for instant messaging usage |
US7209957B2 (en) * | 2003-09-15 | 2007-04-24 | Sbc Knowledge Ventures, L.P. | Downloadable control policies for instant messaging usage |
US7194516B2 (en) * | 2003-10-23 | 2007-03-20 | Microsoft Corporation | Accessing different types of electronic messages through a common messaging interface |
US20050187781A1 (en) * | 2004-02-25 | 2005-08-25 | Christensen Tore L. | Using business rules for determining presence |
US20090313345A1 (en) * | 2004-05-10 | 2009-12-17 | Yahoo! Inc. | Clearinghouse for messages between disparate networks |
Cited By (62)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110131653A1 (en) * | 2002-06-10 | 2011-06-02 | Quest Software, Inc. | Systems and methods for managing messages in an enterprise network |
US8195833B2 (en) | 2002-06-10 | 2012-06-05 | Quest Software, Inc. | Systems and methods for managing messages in an enterprise network |
US20080196099A1 (en) * | 2002-06-10 | 2008-08-14 | Akonix Systems, Inc. | Systems and methods for detecting and blocking malicious content in instant messages |
US8645547B1 (en) * | 2003-07-25 | 2014-02-04 | Verizon Data Services Llc | Methods and systems for providing a messaging service |
US8407188B1 (en) | 2003-07-25 | 2013-03-26 | Verizon Data Services Llc | Methods and systems for providing data form management |
US8949943B2 (en) | 2003-12-19 | 2015-02-03 | Facebook, Inc. | Messaging systems and methods |
US10469471B2 (en) | 2003-12-19 | 2019-11-05 | Facebook, Inc. | Custom messaging systems |
US8347203B1 (en) | 2004-07-23 | 2013-01-01 | Verizon Data Services Llc | Methods and systems for defining a form navigational structure |
US8285856B1 (en) | 2004-07-23 | 2012-10-09 | Verizon Data Services Llc | Methods and systems for integrating a messaging service with an application |
US8713175B2 (en) * | 2005-04-04 | 2014-04-29 | Facebook, Inc. | Centralized behavioral information system |
US20130080552A1 (en) * | 2005-04-04 | 2013-03-28 | Jay D. Logue | Federated Challenge Credit System |
US10009386B2 (en) * | 2006-01-13 | 2018-06-26 | Fortinet, Inc. | Computerized system and method for advanced network content processing |
US20150113630A1 (en) * | 2006-01-13 | 2015-04-23 | Fortinet, Inc. | Computerized system and method for advanced network content processing |
US8468589B2 (en) * | 2006-01-13 | 2013-06-18 | Fortinet, Inc. | Computerized system and method for advanced network content processing |
US20130305346A1 (en) * | 2006-01-13 | 2013-11-14 | Fortinet, Inc. | Computerized system and method for advanced network content processing |
US20170302705A1 (en) * | 2006-01-13 | 2017-10-19 | Fortinet, Inc. | Computerized system and method for advanced network content processing |
US9253155B2 (en) * | 2006-01-13 | 2016-02-02 | Fortinet, Inc. | Computerized system and method for advanced network content processing |
US20070169184A1 (en) * | 2006-01-13 | 2007-07-19 | Fortinet, Inc. | Computerized system and method for advanced network content processing |
US8925065B2 (en) * | 2006-01-13 | 2014-12-30 | Fortinet, Inc. | Computerized system and method for advanced network content processing |
US20160127419A1 (en) * | 2006-01-13 | 2016-05-05 | Fortinet, Inc. | Computerized system and method for advanced network content processing |
US9825993B2 (en) * | 2006-01-13 | 2017-11-21 | Fortinet, Inc. | Computerized system and method for advanced network content processing |
US20080126482A1 (en) * | 2006-11-27 | 2008-05-29 | O'sullivan Patrick | Trusted contact name validation |
US9628490B2 (en) * | 2006-11-27 | 2017-04-18 | International Business Machines Corporation | Trusted contact name validation |
US8856782B2 (en) | 2007-03-01 | 2014-10-07 | George Mason Research Foundation, Inc. | On-demand disposable virtual work system |
US20090125902A1 (en) * | 2007-03-01 | 2009-05-14 | Ghosh Anup K | On-demand disposable virtual work system |
US9846588B2 (en) | 2007-03-01 | 2017-12-19 | George Mason Research Foundation, Inc. | On-demand disposable virtual work system |
US10956184B2 (en) | 2007-03-01 | 2021-03-23 | George Mason Research Foundation, Inc. | On-demand disposable virtual work system |
US20100122343A1 (en) * | 2008-09-12 | 2010-05-13 | Anup Ghosh | Distributed Sensor for Detecting Malicious Software |
US9871812B2 (en) | 2008-09-12 | 2018-01-16 | George Mason Research Foundation, Inc. | Methods and apparatus for application isolation |
US9098698B2 (en) | 2008-09-12 | 2015-08-04 | George Mason Research Foundation, Inc. | Methods and apparatus for application isolation |
US11310252B2 (en) | 2008-09-12 | 2022-04-19 | George Mason Research Foundation, Inc. | Methods and apparatus for application isolation |
US10187417B2 (en) | 2008-09-12 | 2019-01-22 | George Mason Research Foundation, Inc. | Methods and apparatus for application isolation |
US10567414B2 (en) | 2008-09-12 | 2020-02-18 | George Mason Research Foundation, Inc. | Methods and apparatus for application isolation |
US9602524B2 (en) | 2008-09-12 | 2017-03-21 | George Mason Research Foundation, Inc. | Methods and apparatus for application isolation |
US10243975B2 (en) * | 2009-04-09 | 2019-03-26 | George Mason Research Foundation, Inc. | Malware detector |
US9531747B2 (en) | 2009-04-09 | 2016-12-27 | George Mason Research Foundation, Inc. | Malware detector |
US11916933B2 (en) | 2009-04-09 | 2024-02-27 | George Mason Research Foundation, Inc. | Malware detector |
US11330000B2 (en) | 2009-04-09 | 2022-05-10 | George Mason Research Foundation, Inc. | Malware detector |
US20110099620A1 (en) * | 2009-04-09 | 2011-04-28 | Angelos Stavrou | Malware Detector |
US8935773B2 (en) * | 2009-04-09 | 2015-01-13 | George Mason Research Foundation, Inc. | Malware detector |
US9043407B1 (en) * | 2009-06-12 | 2015-05-26 | Avaya Inc. | Interactive user interface to communication-enabled business process platforms method and apparatus |
US8839422B2 (en) | 2009-06-30 | 2014-09-16 | George Mason Research Foundation, Inc. | Virtual browsing environment |
US9436822B2 (en) | 2009-06-30 | 2016-09-06 | George Mason Research Foundation, Inc. | Virtual browsing environment |
US20110167492A1 (en) * | 2009-06-30 | 2011-07-07 | Ghosh Anup K | Virtual Browsing Environment |
US10120998B2 (en) | 2009-06-30 | 2018-11-06 | George Mason Research Foundation, Inc. | Virtual browsing environment |
US20120150959A1 (en) * | 2010-12-14 | 2012-06-14 | Electronics And Telecommunications Research Institute | Spam countering method and apparatus |
US10043001B2 (en) | 2011-12-02 | 2018-08-07 | Invincea, Inc. | Methods and apparatus for control and detection of malicious content using a sandbox environment |
US9081959B2 (en) | 2011-12-02 | 2015-07-14 | Invincea, Inc. | Methods and apparatus for control and detection of malicious content using a sandbox environment |
US12019734B2 (en) | 2011-12-02 | 2024-06-25 | Invincea, Inc. | Methods and apparatus for control and detection of malicious content using a sandbox environment |
US9519779B2 (en) | 2011-12-02 | 2016-12-13 | Invincea, Inc. | Methods and apparatus for control and detection of malicious content using a sandbox environment |
US10467406B2 (en) | 2011-12-02 | 2019-11-05 | Invincea, Inc. | Methods and apparatus for control and detection of malicious content using a sandbox environment |
US10984097B2 (en) | 2011-12-02 | 2021-04-20 | Invincea, Inc. | Methods and apparatus for control and detection of malicious content using a sandbox environment |
US20150282233A1 (en) * | 2014-03-31 | 2015-10-01 | Takeshi Homma | Communication management system, communication management method, and recording medium storing communication management program |
US20170201474A1 (en) * | 2014-06-10 | 2017-07-13 | Netease, Inc. | Method and device for questioning and answering |
US10944699B2 (en) * | 2014-06-10 | 2021-03-09 | Netease, Inc. | Method and device for questioning and answering |
US20210352059A1 (en) * | 2014-11-04 | 2021-11-11 | Huawei Technologies Co., Ltd. | Message Display Method, Apparatus, and Device |
US20220124094A1 (en) * | 2015-05-08 | 2022-04-21 | A10 Networks, Incorporated | Integrated bot and captcha techniques |
US12160425B2 (en) * | 2015-05-08 | 2024-12-03 | A10 Networks, Incorporated | Integrated bot and captcha techniques |
US10630535B2 (en) * | 2018-05-21 | 2020-04-21 | Qualcomm Incorporated | Notification timing for electronic devices |
US11196892B2 (en) | 2019-05-30 | 2021-12-07 | Microsoft Technology Licensing, Llc | Use of client compute for document processing |
US11341271B2 (en) | 2019-05-30 | 2022-05-24 | Microsoft Technology Licensing, Llc | Information barriers for sensitive information |
WO2022100246A1 (en) * | 2020-11-11 | 2022-05-19 | 中兴通讯股份有限公司 | Client device, information processing method, and computer-readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7899867B1 (en) | SpIM blocking and user approval techniques for real-time messaging networks | |
US7596599B1 (en) | Management capabilities for real-time messaging networks | |
US7853652B2 (en) | Instant messaging system with privacy codes | |
EP1788770B1 (en) | A method for establishing a secure e-mail communication channel between a sender and a recipient | |
US8085891B2 (en) | System and method for management of mobile device communication | |
US10992802B2 (en) | System and method for tracking and archiving mobile communications | |
US10652173B2 (en) | Method for establishing bi-directional messaging communications with wireless devices and with remote locations over a network | |
AU2006242410B2 (en) | Methods and apparatus for enabling a dynamic network of interactors according to personal trust levels between interactors | |
US7249175B1 (en) | Method and system for blocking e-mail having a nonexistent sender address | |
US8069166B2 (en) | Managing user-to-user contact with inferred presence information | |
US9077739B2 (en) | Messaging security device | |
US20040203589A1 (en) | Method and system for controlling messages in a communication network | |
US20040143632A1 (en) | Method and system for publication of instant messaging privacy codes | |
US20070220143A1 (en) | Synchronous message management system | |
CN101841489B (en) | System and method for controlling access to an electronic message recipient | |
US8090788B2 (en) | Method and system for filtering electronic messages | |
US8862671B2 (en) | Aggregate communications with intelligent sourcing | |
US8463938B2 (en) | Address couplet communication filtering | |
KR101493465B1 (en) | Synchronous message management system | |
US11196700B1 (en) | Single-user non-transferrable communication client for public communication networks | |
JPH10275119A (en) | Electronic mail system | |
US20030084167A1 (en) | System, method, apparatus and means for information transmission over a computer network | |
Osterman | Instant messaging in the enterprise | |
JP2009505216A (en) | System and method for detecting and filtering unsolicited electronic messages | |
EP1863305A1 (en) | System and method for management of mobile device communication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: FACE TIME COMMUNICATIONS, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SHERSTINSKY, ALEX;PETVIASHVILI, JOSEPH;YOUNG, ERIC;AND OTHERS;REEL/FRAME:016176/0728 Effective date: 20041227 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
AS | Assignment |
Owner name: GOLUB CAPITAL LLC, AS AGENT, ILLINOIS Free format text: SECURITY INTEREST;ASSIGNOR:ACTIANCE, INC.;REEL/FRAME:035527/0923 Effective date: 20150429 |
|
AS | Assignment |
Owner name: ACTIANCE, INC., CALIFORNIA Free format text: CHANGE OF NAME;ASSIGNOR:FACETIME COMMUNICATIONS, INC.;REEL/FRAME:035705/0823 Effective date: 20110125 |
|
FEPP | Fee payment procedure |
Free format text: PAT HOLDER CLAIMS SMALL ENTITY STATUS, ENTITY STATUS SET TO SMALL (ORIGINAL EVENT CODE: LTOS); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
AS | Assignment |
Owner name: PNC BANK, NATIONAL ASSOCIATION, PENNSYLVANIA Free format text: SECURITY INTEREST;ASSIGNORS:MOBILEGUARD, LLC;SMARSH INC.;SKYWALKER INTERMEDIATE HOLDINGS, INC.;AND OTHERS;REEL/FRAME:045065/0916 Effective date: 20180227 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2552); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY Year of fee payment: 8 |
|
AS | Assignment |
Owner name: ACTIANCE, INC., CALIFORNIA Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME: 035527 / 0923;ASSIGNOR:GOLUB CAPITAL LLC;REEL/FRAME:058906/0160 Effective date: 20171130 |
|
AS | Assignment |
Owner name: OWL ROCK CAPITAL CORPORATION, AS COLLATERAL AGENT, NEW YORK Free format text: PATENT SECURITY AGREEMENT;ASSIGNOR:ACTIANCE, INC.;REEL/FRAME:059191/0423 Effective date: 20220218 |
|
AS | Assignment |
Owner name: ACTIANCE HOLDINGS, INC., OREGON Free format text: TERMINATION AND RELEASE OF PATENT SECURITY AGREEMENT AT REEL/FRAME NO. 45065/0916;ASSIGNOR:PNC BANK, NATIONAL ASSOCIATION;REEL/FRAME:059315/0572 Effective date: 20220218 Owner name: ACTIANCE, INC., CALIFORNIA Free format text: TERMINATION AND RELEASE OF PATENT SECURITY AGREEMENT AT REEL/FRAME NO. 45065/0916;ASSIGNOR:PNC BANK, NATIONAL ASSOCIATION;REEL/FRAME:059315/0572 Effective date: 20220218 Owner name: SKYWALKER INTERMEDIATE HOLDINGS, INC., OREGON Free format text: TERMINATION AND RELEASE OF PATENT SECURITY AGREEMENT AT REEL/FRAME NO. 45065/0916;ASSIGNOR:PNC BANK, NATIONAL ASSOCIATION;REEL/FRAME:059315/0572 Effective date: 20220218 Owner name: SMARSH INC., OREGON Free format text: TERMINATION AND RELEASE OF PATENT SECURITY AGREEMENT AT REEL/FRAME NO. 45065/0916;ASSIGNOR:PNC BANK, NATIONAL ASSOCIATION;REEL/FRAME:059315/0572 Effective date: 20220218 Owner name: MOBILEGUARD, LLC, OREGON Free format text: TERMINATION AND RELEASE OF PATENT SECURITY AGREEMENT AT REEL/FRAME NO. 45065/0916;ASSIGNOR:PNC BANK, NATIONAL ASSOCIATION;REEL/FRAME:059315/0572 Effective date: 20220218 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2553); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY Year of fee payment: 12 |